Hi.
I'm not sure on how to trap hackers, but you I'm sure you are aware that the people who attempt to breach systems are always on the lookout for traps.
They know what to look for, what looks right or wrong etc. One other thing, it's likely that at least a few members of the ISA list are simply watching over it for intresting information regarding bugs and exploits.
It's probably best if you dont 'formalise' any of these traps in a broadcast email, in case you wise any potential hackers to them.
NR - Studmuffin